Page 496 - 《软件学报》2024年第4期
P. 496
2074 软件学报 2024 年第 35 卷第 4 期
Machinery, 2017. 565–581. [doi: 10.1145/3132747.3132778]
[6] Shekhtman L, Waisbard E. EngraveChain: A blockchain-based tamper-proof distributed log system. Future Internet, 2021, 13(6): 143.
[doi: 10.3390/fi13060143]
[7] Liao XK, Li SS, Dong W, Jia ZY, Liu XD, Zhou SL. Survey on log research of large scale software system. Ruan Jian Xue Bao/Journal
of Software, 2016, 27(8): 1934−1947 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/4936.htm [doi: 10.13328/j.cnki.
jos.004936]
[8] The Syslog Protocol. 2009. https://datatracker.ietf.org/doc/html/rfc5424
[9] Chowdhury S, Di Nardo S, Hindle A, Jiang ZM. An exploratory study on assessing the energy impact of logging on Android applications.
Empirical Software Engineering, 2018, 23(3): 1422–1456. [doi: 10.1007/s10664-017-9545-x]
[10] Zhauniarovich Y, Gadyatskaya O. Small changes, big changes: An updated view on the Android permission system. In: Proc. of the 19th
Int’l Symp. on Research in Attacks, Intrusions, and Defenses. Paris: Springer, 2016. 346–367. [doi: 10.1007/978-3-319-45719-2_16]
[11] Elgharabawy M, Kojusner B, Mannan M, Butler KRB, Williams B, Youssef A. SAUSAGE: Security analysis of UNIX domain socket
usage in Android. In: Proc. of the 7th IEEE European Symp. on Security and Privacy (EuroS&P). Genoa: IEEE, 2022. 572–586. [doi: 10.
1109/EuroSP53844.2022.00042]
[12] Fukui D, Shimaoka M, Mikami H, Hillenbrand D, Yamamoto H, Kimura K, Kasahara H. Annotatable systrace: An extended Linux
FTrace for tracing a parallelized program. In: Proc. of the 2nd Int’l Workshop on Software Engineering for Parallel Systems. Pittsburgh:
Association for Computing Machinery, 2015. 21–25. [doi: 10.1145/2837476.2837479]
[13] Kilbury J, Bontcheva K, Samih Y. FTrace: A tool for finite-state morphology. In: Proc. of the 9th Int’l Workshop on Finite State Methods
and Natural Language Processing. Blois: Association for Computational Linguistics, 2011. 88–92.
[14] Yang S, Park SJ, Ousterhout J. NanoLog: A nanosecond scale logging system. In: Proc. of the 2018 USENIX Annual Technical Conf.
Boston: USENIX Association, 2018. 335–349.
[15] Gupta S. Pro Apache Log4j. 2nd ed., Berkeley: Apress, 2005.
[16] Srinivasa S, Pedersen JM, Vasilomanolakis E. Deceptive directories and “vulnerable” logs: A honeypot study of the LDAP and Log4j
attack landscape. In: Proc. of the 2022 IEEE European Symp. on Security and Privacy Workshops (EuroS&PW). Genoa: IEEE, 2022.
442–447. [doi: 10.1109/EuroSPW55150.2022.00052]
[17] Liu WZ, Tao QY, He Q, Yu LJ. Application of Log4j in e-commerce services. Applied Mechanics and Materials, 2014, 635 –637:
1517–1521. [doi: 10.4028/www.scientific.net/AMM.635-637.1517]
[18] OpenHarmony. 2009. https://gitee.com/openharmony
[19] Xu YX. Research and design of high performance distributed log system. Industrial Control Computer, 2020, 33(12): 44–46 (in Chinese
with English abstract). [doi: 10.3969/j.issn.1001-182X.2020.12.019]
[20] You Y, Wang H, Ren T, Gu SH, Sun JL. Storage design of tracing-logs for application performance management system. Ruan Jian Xue
Bao/Journal of Software, 2021, 32(5): 1302−1321 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/6234.htm [doi: 10.
13328/j.cnki.jos.006234]
[21] Guo JW, Cai P, Qian WN, Zhou AY. Accurate and efficient follower log repair for Raft-replicated database systems. Frontiers of
Computer Science, 2021, 15(2): 152605. [doi: 10.1007/s11704-019-8349-0]
[22] Liang GY, Wu YJ, Wu JZ, Zhao C. Open source software supply chain for reliability assurance of operating systems. Ruan Jian Xue
Bao/Journal of Software, 2020, 31(10): 3056−3073 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/6070.htm [doi:
10.13328/j.cnki.jos.006070]
[23] Neira-Ayuso P, Gasca RM, Lefevre L. Communicating between the kernel and user-space in Linux using Netlink sockets. Software:
Practice and Experience, 2010, 40(9): 797–810. [doi: 10.1002/spe.981]
[24] Shakya B, Xu XL, Tehranipoor M, Forte D. CAS-Lock: A security-corruptibility trade-off resilient logic locking scheme. IACR Trans. on
Cryptographic Hardware and Embedded Systems, 2020, 2020(1): 175–202. [doi: 10.13154/tches.v2020.i1.175-202]
[25] Torrellas J, Lam MS, Hennessy JL. False sharing and spatial locality in multiprocessor caches. IEEE Trans. on Computers, 1994, 43(6):
651–663. [doi: 10.1109/12.286299]
[26] Dechev D. The ABA problem in multicore data structures with collaborating operations. In: Proc. of the 7th Int’l Conf. on Collaborative
Computing: Networking, Applications and Worksharing (CollaborateCom). Orlando: IEEE, 2011. 158–167. [doi: 10.4108/icst.collabora
tecom.2011.247161]
[27] China Academy of Information and Communications. White Paper of IOT. 2020 (in Chinese). http://www.caict.ac.cn/english/research/
whitepapers/202012/P020201223330673521178.pdf
[28] Murthy S, Bakar AA, Rahim FA, Ramli R. A comparative study of data anonymization techniques. In: Proc. of the 5th IEEE Int’l Conf.